Folgen
Christian Wressnegger
Christian Wressnegger
Bestätigte E-Mail-Adresse bei kit.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Dos and don'ts of machine learning in computer security
D Arp, E Quiring, F Pendlebury, A Warnecke, F Pierazzi, C Wressnegger, ...
31st USENIX Security Symposium (USENIX Security 22), 3971-3988, 2022
2822022
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2122013
Poisoning behavioral malware clustering
B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
1642014
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols
H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck
Security and Privacy in Communication Networks: 11th EAI International …, 2015
1492015
A close look on n-grams in intrusion detection: anomaly detection vs. classification
C Wressnegger, G Schwenk, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
1302013
Evaluating explanation methods for deep learning in security
A Warnecke, D Arp, C Wressnegger, K Rieck
2020 IEEE european symposium on security and privacy (EuroS&P), 158-174, 2020
1092020
Privacy threats through ultrasonic side channels on mobile devices
D Arp, E Quiring, C Wressnegger, K Rieck
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 35-47, 2017
942017
New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild
M Musch, C Wressnegger, M Johns, K Rieck
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
682019
Machine unlearning of features and labels
A Warnecke, L Pirch, C Wressnegger, K Rieck
arXiv preprint arXiv:2108.11577, 2021
672021
Automatically inferring malware signatures for anti-virus assisted attacks
C Wressnegger, K Freeman, F Yamaguchi, K Rieck
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
612017
Thieves in the browser: Web-based cryptojacking in the wild
M Musch, C Wressnegger, M Johns, K Rieck
Proceedings of the 14th International Conference on Availability …, 2019
472019
Zoe: Content-based anomaly detection for industrial control systems
C Wressnegger, A Kellner, K Rieck
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
412018
Comprehensive analysis and detection of flash-based malware
C Wressnegger, F Yamaguchi, D Arp, K Rieck
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
37*2016
Web-based Cryptojacking in the Wild
M Musch, C Wressnegger, M Johns, K Rieck
arXiv preprint arXiv:1808.09474, 2018
362018
TypeMiner: Recovering types in binary programs using machine learning
A Maier, H Gascon, C Wressnegger, K Rieck
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
332019
Reproducibility and replicability of web measurement studies
N Demir, M Große-Kampmann, T Urban, C Wressnegger, T Holz, ...
Proceedings of the ACM Web Conference 2022, 533-544, 2022
282022
Sally: A tool for embedding strings in vector spaces
K Rieck, C Wressnegger, A Bikadorov
The Journal of Machine Learning Research 13 (1), 3247-3251, 2012
272012
False sense of security: A study on the effectivity of jailbreak detection in banking apps
A Kellner, M Horlboge, K Rieck, C Wressnegger
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 1-14, 2019
252019
Harry: A tool for measuring string similarity
K Rieck, C Wressnegger
The Journal of Machine Learning Research 17 (1), 258-262, 2016
222016
Deobfuscating embedded malware using probable-plaintext attacks
C Wressnegger, F Boldewin, K Rieck
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
182013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20